This guide tells you how to configure AWS (CloudTrail) collection protocol which collects events from Amazon Web Services (AWS) CloudTrail.

How AWS Collection Works

The Log Collector service collects events from Amazon Web Services (AWS) CloudTrail. CloudTrail records AWS API calls for an account. The events contain the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service. The AWS API call history provided by CloudTrail events enables security analysis, resource change tracking, and compliance auditing. CloudTrail uses Amazon S3 for log file storage and delivery. Security Analytics copies the log files from the cloud (S3 bucket), and sends the events contained in the files to the Log Collector.

Deployment Scenario

The following figure illustrates how you deploy the AWS (CloudTrail) Collection Protocol in Security Analytics.

Procedures

Configure AWS (CloudTrail) Collection Protocol in Security Analytics

You configure the Log Collector to use AWS (CloudTrail) collection for an event source in the event Source tab of the Log Collector parameter view. The following figure the basic workflow for configuring an event source for AWS (CloudTrail) Collection in Security Analytics. Please refer to: